enterprise cyber security
DESCRIPTION
Develop Strategies to Utilize People, Process & Technology to Optimize your Governance, Risk & Compliance ManagementTRANSCRIPT
DRAFT COPY
And many more…
Host Organization:
Government & Trade:
Industry Insight From:
Expert Speakers End User Perspective
• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardandgivingyouthecompetitiveedge
• establishacleargovernancepolicytoenhanceawarenessthrougheducationgeneratingconfidenceinthesecurityofyoursystem
• learntomitigatetheriskthroughcertification&prioritizationtobuildresilience,improveresponsetimesandenhancesystemrobustness
• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance
• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets
• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI
ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT
ExClUSIvE GAME-CHANGING INFORMATION INCUlDING… ` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC
` Expert technical analysis on major industry challenges including integrated risk management and ‘big data’ from BT Global & Verizon
` Case studies to build clear strategies for efficient and economic compliance from Sempra & Enbridge
` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure
` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs
17-18 April, 2012, San Jose, California, USA
“ Aswenavigatenewanduncertainchallengesinthedigital
age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.
”
President Obama, 2011
Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn
save $400
register before 17th February
DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
www.cybersummits.com/enterpriseFor the latest speaker line up and agenda updates please visit:
DRAFT COPY
Welcome to the enterprise cyber security & information assurance summit
Tel:+44(0)2073757537Email:[email protected]/enterprise
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
Dear Reader,
In the past few years there have been land mark changes to the Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publi-cized breaches and malware. This is all without mentioning the rapidly evolving regulatory and compliance landscape.
Toguaranteeasecureandefficiententerprisesystemitisvitaltoconsiderthethreecoredisciplinesofpeople,processandtechnology.ThewaytobalancetheseareasisthroughtheconceptofGovernance,Risk&Compliance(GRC).EnterpriseGRCbringsthematterofITsecuritytotheboardlevel,drivingspendingandinvestmentinthissector.
` The GRC market is estimated to be worth over $32bn
` By 2015 the US federal Cyber Security market will reach $15bn
` The USA alone spends $14BN a year on IT-governance
Theattacksof2011havetaughtusthatthethreatlandscapeisnotjustevolvingbutrapidlymutating.Thisrequiressecuritymanagerstoconsidernewandcreativetechniquestodetect,preventandprepareforabreachscenario.Withthecostofthebreakdownofonecriticalinfrastructuretopping$230bnandaddedcomplexitycomingfromtheincreasingnumberofregulationsandthefrequentdynamicchangesthisareaisgrowingrapidly.
Noonewantstobetheweaklinkinglobalinfrastructureorhavetheirreputationtarnishedbyabreacheventbutmaintainingsecurityandcomplianceinarapidlyevolvingindustryiscostly, time consuming and technically challenging.Itisnowmorevitalthaneverforpublicandprivatepartnershipstorethinksecuritystrategiestominimizerisk,maximizeresiliencyandensurebusinesscontinuity.
TheEnterpriseCyberSecurity&InformationAssuranceSummitwillsupplyyourbusinesswith:
Thecriticalintelligenceandtoolsyouneedtobuildacosteffective,timeefficientcybersecuritystrategy
Keylessonsandtriedandtestedactionplanstomitigateriskandsave millions of USDincomplianceandreliability
Theinsightandconnectionyouneedtosecureyourplaceinthisboomingindustry
TheEnterpriseCyberSecurity&InformationAssuranceSummitwillbringtogether150cybersecuritysubjectmatterandindustryexpertsfortwodaysofbusinesscriticalstrategy,unrivallednetworkingandstimulatingdiscussion.
IlookforwardtomeetingyouinSanJoseinApril.
Natasha SheelSeniorIndustryAnalystFC Business Intelligence
register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
Enterprise Security Mangers – Protect Against Risk and Regulatory Violation
Withthechallengesandcostsofsecuringthereliabilityofyourinfrastructureincreasingrapidlyitisessentialtoapproachthesecomplexconcernswithdetailedplanning.Thisfocussedmeetingwillequipyouwiththeforesighttoeconomicallyensuretheresiliencyofyourassets.
` Industry leading case studies on integrated risk management and compliance solutions from Sempra & Enbridge
` Federal and national initiatives driving change in standards and auditing
` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership
Don’tgetcaughtouttherapidlychanginglandscapeandthecostofabreach.Discoverclearprovenstrategiesbeingimplementedbyyourinformationsecuritypeersbysigninguptoday!
Solution Providers – Cyber Security Activity is on the Rise…Asintegratedandmobiledevicesbecomeubiquitousitisvitalthatthetechnologysecuringkeyinformationassetsevolvewiththis.WiththelikelyhoodofaPearlHarbor-scaleintrusionin2012increasingmilitaryinformationsecurityspendingby50%to$9bn-thepotentialforhugecontractshasneverbeengreater!
Atthisgroundbreakinggroundbreakingindustryeventyouwillhear…
• National risk management and security initiatives from international trend setters including BT & Wells Fargo
• Enterprise end user need for industry wide co-operation and standardization outlined by FBI and ISA
• Federal and national plans for regulations and enhancing security
JonthepremierCyberSecurityforumtoreceivemarketforecastandinsightintogovernmentleadindustrydriverstoaccuratelyplanyourbusinessfor2012andbeyond.
We’llputyouinfrontofindustryleadingbuyersfromacrossNorthAmericatofill your order books in 2 days!
What We Are Going To Do for You…
PracticalrealworldstrategiesandsharingbestpracticeareattheforefrontoftheEnterprise Cyber Security & Information Assurance Summit.Wearecommittedtoensuringyougoawaywithnewcontactsandthemostup-to-dateinformation.Mostimportantlyyouwillleaveknowingyourbusinessisgoingtomoveforward
` REALIZE initiatives to ensure the security and reliability of critical infrastructure
` ASCERTAIN how to ensure cost effective and efficient security and compliance maintenance
` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology
` LISTEN to case studies from leading end users and government bodies for how to successfully merge people, process & technology to ensure the reliability of your assets
` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency
“GICSRisproudtobecollaboratingwithFCBusinessIntelligenceonthisprojectbringingtogetherkeyseniorlevelITSecuritypersonneltotacklethekeychallengesfacingNorthAmericancriticalenterprises.
TheEnterpriseCyberSecurity&InformationAssuranceSummitwillhelpyouto:
` Develop strategies to utilize people, process & technology
` Optimizing your governance, risk & compliance management
Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecriticalespeciallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn.”Richard Zaluski, Executive VP – International, GICSR
DRAFT COPY
MORNING AFTERNOON EXTRAS
Day 1
April 17th
•IndustryDrivers:latestonWhitehouse,DoDandDHSinitiatives•Lookingatthestandardsandtheirevolutiontomanagingyourgovernance&compliancestrategy
•Mitigatingtheriskandunderstandingthethreat•BuildingincidentresponseplansandSIEM
•RedDragonRisingWorkshop:ManagingInternationalcyberThreat•CISOroundtable•Networkingdrinksreception
Day 2 April 18th
•Maximizingsecuritythroughmergingpeople,process&technology•Ensuringaneducated&awareworkforce
•Managingregulationthroughintegratedrisksolutions•Breachscenarioevent
•CriticalInfrastructureandKeyResourceProtectionworkshop•RedDragonRisingWorkshop:ManagingChinesecyberThreat
Conference at a glance
register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537
expert speakers at this year’s meeting include:
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
KEYNOTE SPEAKERS
Jay Bavisi, President & CEO, EC Council
John Chesson, Special Agent, FBI
Rob Duiven Programme Director, National Cyber Security Strategy, Ministry of Security and
PHOTO
Munillal Chatarpal, Manager - Risk Management & Security, enbridge energy
Ola Lawal, Corporate Security Officer, enbridge energy
Alexander Kunz, Security Governance Manager, sempra
Ken Baylor, VP / CISO of Security & Antifraud, Wells Fargo
TBA, Director – Governance, Risk, Compliance, bt Global
Catherine Lester, Solutions Architect, verizon
TBA, Director, raytheon
Christopher Leigh, Global IT Compliance & Risk Officer, utc
David Gavilan, Executive Director & Assistant General Counsel, Jp Morgan chase
END USER PERSPECTIVE
GOVERNMENT & TRADE BODIES:
Deborah Kobza, Executive Director / CEO, Gicsr & nh-isac
Richard Zaluski, Executive Vice President - International, Gicsr
Larry Clifton, CEO / President, internet security alliance
(RET) General Mick Kicklighter, Director, Department of cip & hs, George Mason university
Steve Haynes, Director - Cyber Security & information Assurance, Whitehouse national security telecommunications advisory committee
INDUSTRY EXPERTS INCLUDING:
Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM
Gene Fredriksen, Global CISO, tYco
Ernie Rakaczky, Principal Security Architect, invensys
William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Cyber Security Strategist, red-Dragon rising
Marci McCarthy, President CEO, tech exec networks
Ourexpertspeakerlineupwillbediscussingtheissuescriticaltoyou.TheFBIComputerIntrusion&CounterIntelligencealongwithIBMwhowillbediscussingtheneedforbuildingalongtermincidentresponseplan.
Turnover to see the extensive agenda, established techniques and forward looking strategies our internationally renowned speakers will be presenting and sharing at this premier industry meeting...
DRAFT COPY
register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
Session 1: Industry Drivers Guide to EU and National Policies and Initiatives• Hearfirstthelegislationandstandardsassociatedwiththerolloutofsmartgridtechnologyensuringyourknowledgeisup-to-date
• Realizethetruerequirementforsecurityasintelligentandintegratedtechnologybecomesarealityallowingyoustandoutinacompetitiveindustry
• Learnhowtosecurelyintegratesmarttechnologythroughouttheindustrytoenhanceyourproductivityandreliability
• DiscoverthetruepotentialforintegratedoperationstoensurethesecurityofEurope’senergyfuture
EvangelosOuzonis,Senior Expert, Network Security Policy,ENISA
Panel Session: Certifying Vendor Security and Utility Operations• Looktheatco-operativeeffortstoestablishtestingandcertificationofvendortechnologytoguaranteeyouworkwithtrustedproviders
• Explorethedevelopmentofcross-industrypartnershipstoestablishstandardsthatwillproduceresults
• Discussthelogisticsofensuringthattechnologyandequipmentareutilizedsecurelythroughcertifyingtheoperatorsofcriticalinfrastructureensuringoverallsystemrobustness
• Uncovertheneedtoverifytheorganizationalprocessesandinternalsecurityoftheendusertoimproveresilienceanddriveenhancedsecurity
Moderator:TylerWilliams,President,WurldTECH
EndUsers:Cyber Security Lead, Shell, WIB members
Case Study: The Efforts of EuroSCSIE in Standards and Guidelines• Anexpertleadlookatthestandardsandguidelinesavailabletoboostyourunderstanding
• Learnwhichstandardsarecompatibleandusethesetobuildaneffectivesecurityprogram
• Hearabouttheeffortstobuildinternationalindustry-widebestpracticeguidelinesandrequirementsplacingyouaheadofthecompetition
• DiscovertheEuropeanwideeffortstoincreaseawarenessthroughsharingandexchanginginformationtobuildprovenstrategies
AnnemarieZielstra,Director, EuroSCSIE / CPNI.NL
Session 2: Managing the ThreatCase Study: Defending the Triad - Energy and Critical Infrastructure• Learnhowenergyinfrastructureisakeypartofanynationaldefensivecyber-securityposturetoensureeffectiveprotection
• Discoveranationalsecurityprospectivetocounteringcyber-spiesfromNationalCyber-Entitiescompromisingtheelectricitygridtoensurethesecurity
• Understandthecyber-threatsandimpactofanattacktotheEnergyCriticalInfrastructuresoyoucanbeconfidentinyourpreparation
• Expertleadcasestudiesofpastcyber-eventstothepowerinfrastructureincludingtheAuroraandStuxnetvulnerabilitiesdefiningcomprehensivesecurityprecautionsfortheenergysector
RichardZaluski,Executive Vice President, International,GICSR
Panel Session: Vulnerability and Impact Analysis• Learnhowtoutilizepenetrationtestingandlookatrealisticattackscenariostostudytheconsequencesandimpactsidentifyingthevulnerabilitiessoyoucanprotectyoursystem
• Analyzeyoursystemstoidentifyhighriskhighimpactareastoefficientlyfocusyourresourcestoenhanceyourresiliencyandsystemrobustness
• Establishthebestwaytoascertainwhatisconnectedguaranteeingthesafemigrationfromanisolatedsystem
• Understandingthescopeofadditionalconnectivityandtheassociatedrisksbuildingcomprehensivesecurityprecautions
Moderator:DavidSpinks,Chairman,CSIRS
Vendor:PeterWood,CEO, First Base Technologies
Case Study: Establishing emergency response plans and CERT• Understandthethreats.vulnerabilitiesandconsequencesofabreachsoyoucanbuildaclearactionplan
• Establishacomputeemergencyresponsesothereisaclearactionplanforsystemfailuresensuringyouarebackon-lineasquicklyaspossible
• Learnhowtoimproveyourresiliencyandrecoverytominimizeyourdowntimeifthesystemfails
• Discovertheoperationalbenefitsofcybersecurityandsystemrobustnessmaximizingproductivity
DimitriosSerpanos,Director, ISI
Session 3: Mitigating the riskBuilding Multi-layer Security• Discoverhowtoeffectivelyanddynamicallyprioritizebetweenavailability,integrityandconfidentialitymaximizingtheefficiencyofyouroperations
• DevelopprovenandeffectivestrategiesofprotectionmergingITandphysicaltechniquestoenhanceyoursystemsecurity
• Learntechniquestomonitorwhatishappeningbothinsideandoutsidetheofficetomitigaterisk
• Mastertheartofeducatingpersonnelinhowtoprotecttheirindustryensuringsecurityandefficiency
ErnieHayden,Managing Principal,Global Energy and Utility Vertical,Verizon
Case Study: Shell and WurldTECH's collaboration in Infrastructure Security• Understandthescopeofadditionalconnectivityandtheassociatedriskstomaximiseyoursecurity
• Learnmethodstoprotectagainstmalwareandsocialengineeringtargetingsensitivebusinessinformationthatyoucanimplement
• Discoverprovenrealworldstepstosecurecriticalinformationinfrastructuresoyoucanbeconfidentinthestrengthofyoursystem
• Gainanup-to-theminuteunderstandingofwherethesecurityneeds,threatsandsolutionsareheadingensuringyoustaycompetitive
Expert,Cyber Security Lead, Shell
TylerWilliams,President,WurldTECH
Access Control• Discoverrealworldtechniquestoauthenticateusersgivingyouconfidenceinthesecurityofyoursystem
• learnprovenmethodstomanagewhohasauthorizationandaccessallowingyoutomaximizetheprotectionofyoursystem
• Discoverstrategiestoidentifytheindividualsbeinggrantedaccesstoyoursystemtostrengthenyourdefenses
• Hearastepbystepguidetoenforceuseraccountabilitytoenhanceyoursecurity
November 8th - 9th, Movenpick, Amsterdam, Netherlands
GET THE MOST OUT OF THE CONFERENCEAttend one of our exclusive workshops
CSIRS and RUSIClosed Door Meeting:Confidentialdiscussionofthethreatsyouarefacing,thestepsbeingutilizedtoprotectyourorganizationandguidestobuildingresponseplanstoenhanceoverallsystemrobustness
Red Dragon Rising Workshop:Expertleadsessioncoveringthemotivationsforgovern-mentandcommerciallysponsoredcyber-attacks.Takeawayaclearstepbystepguideforyoutoimplementinyourorganizationmaximizingyourresilience
Visit www.cybersummits.com/EU to find out more
3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400Email [email protected] with BOOKME in the subject lineCall me now on +44 207 375 7537Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml
DRAFT COPY
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
Session 4: People and Policy National Cyber Security Strategy: 'Success through cooperation'• DiscussmethodstosecuretheICTinfrastructurecriticaltoensurethestrengthofthenationalandEuropeansocietyandeconomy
• Hearplansfornecessarycooperationbetweenexistingparties(public&private)inthedigitalsocietyataninternationallevel
• DiscovermethodstobuildsecuritythroughLinkingandreinforcinginitiativesandencouragingindividualresponsibilityensuringyouhavetheresponsecapacitytowithstandICTdisruptionsandcyberattacks
• LearnhowestablishingtheCyberSecurityBoardandNationalCyberSecurityCentrewillusetoself-regulation,legislationandifnecessaryregulationsincreasetheresilienceofCriticalInfrastructure
RobDuiven,Programme Director,National Cyber Security Strategy, Ministry of Security and Justice
Case Study: CPNI and Dutch Government Policy and Training Initiatives• Discoverhowpublic–privatepartnershipscanbeusedtomakeyourcriticalinfrastructuremoreresilient
• Learntestedtechniquestoeducate,raiseawarenessandmanagethelatesttechnologiesandchallengesfromtheCybercrimeInformationExchangeincreasingyouroperationalrobustness
• Discovertheprocesscontrolandsmartgridroadmapoutliningastepbystepguidetoguaranteesecurity
• GainthelatestinsightintotheplannedNetherlandsandEuropeancybertechnologyandtrainingfacilityandlearnhowthisfitsintotheDutchNCSSandEU-USinitiativesoncyber-securitylettingyougaintheedgeinatoughindustry
AukeHuistra,Project Manager Cybercrime Information Exchange,CPNI.NL
RobDuiven,Programme Director, NationalCyberSecurityStrategy,Ministry of Security and Justice
People and Process• Realizethattechnologyisnecessaryforsecuritybutpeopleandprocessareofequalorgreaterimportancetoguaranteecompletesecurity
• Understandthataddressingpeople,processandtechnologytogetherwillgiveagreaterchanceofmaintainingandprotectingtheintegrityofyourIPnetworks
• Learnhowtoguaranteepersonnel(andfamilies)arefullyeducated,professionalandcompetentthroughutilizinggovernanceandpolicytobuildawareness
• Hearstrategiestotrainsecurityandnetworkpersonneltokeepavigilanteyeonthetrafficpatternstodiscerntheprecursoranomaliestonewanddifferentlevelsofattackensuringyouareprepared
JohnBasset,Assosciate, RUSI
Session 5: Operational and Information Technology
Security Challenges for Information Technology controlling Energy Systems• Realizethechallengestounitingthetwodifferentworldstodeterminehowtobridgethegapimprovingeducationandcommunication
• Uncovertherequirementsforsmartsecurityacrosstheenergychainfromsmartappliances,gridandmarketoperatorsbuildingactionplansthatdriveresults
• Learnwhysomeonemayconsiderdisruptingtheenergychainandyouroperationsguaranteeingtheprotectionofyoursystem
• Hearplansforpathwaytoavoidsecuritybecomingashowstopperfornewenergysystemsensuringyoustayproductiveandprofitable
EricLuiijf,C(I)IP Consultant, TNO / CPNI.NL
Case Study: Alliander’s work in Uniting Process and IT Security• LearnhowtouniteprocesscontrolandICTsecurityinadvanceofimplementingsmartgridinfrastructuresavingtimefrustrationandmoney
• Hearprovenstrategiestosecuretheintersectionsoftransmission,distributionandgenerationwhichyoucanputtouseimmediately
• DiscoverhowtosuccessfullyapplytheexpertisewithinITtotheoperationsproblemturningwastedhourstoproductiveones
• Realizetheneedforco-ordinationandcollaborationacrossEuropetohelpyoustaycompetitive
JohanRambi, Privacy and Security Officer, Alliander
Building Security in Design• Learnhowtoplanlongtermsecurityintothepurchasinganddeploymentprocesstosavingyoutimeandmoney
• Discovermethodstofactorinthedifferenceinlifespanandtherealisticcostsofupgradestolegacysystemsensuringyoustayprofitable
• Hearrealworldstrategiestobuildhighsecuritylowlatencysolutionsmaximizingyourproductivity
• Developprovenmethodstomaintainsecuritythroughpatching,anti-virusandfirewallsguaranteeingthesecurityofyoursystem
Session 6: Securing Process Control Systems
The connection of SCADA and Corporate networks• HearrealworldproceduresforhowSCADAandbusinessnetworkscanco-existensuringSCADAsystemsarecompliantwithbusinessnetworksecurityrequirementsguaranteeingthesecurityofyoursystem
• LearnclearstrategiestomanageSCADAsysteminventoryinandoutsidetheindustrialITnetworkallowingyoutoconfidentinthestrengthofyoursystem
• DiscoverprovenstrategiestosecuretheconnectionsbetweenprocesscontrolandofficeITnetworksthatwillproduceresults
• UnderstandthetypesoffirewallsavailableforsegregatingtheSCADAandcorporatenetworksmaximizingtheproductivityofyoursystems
GitteBergknut,MU Nordic Information Security Manager, E.ON Sverige AB
Case Study: Elia’s effort to integrate cyber security in the migration from SDH to IP/MPLS network• UncovertestedstrategiestoovercomethetechnicalandorganizationalchallengesofthemigrationfromSDHtoIP/MPLSallowingyoutostaycompetitive
• Discusstheneedforatheimplementationofalayeredsecuritysolutiontoguaranteetheefficiencyofyouroperations
• Listentotheevolvingbusinessneedsrequiredtohandlethemigrationtoasecurelyconnectedsystemgivingyoutheedge
• HearrealworldmethodstoallowITpracticesandoperationalengineeringtoharmonizehelpingdriveyourproductivity
KrisHallaert,IT Security Officer,Elia
Viking Panel Session: Vital Infrastructure, NetworKs, INformation and Control System ManaGement• ExpertleadguidetothevulnerabilitiesofSCADAsystemsandthecostofcyber-attacksonsocietyresultingfromdifferentarchitecturesolutionssavingyoutimeandmoney
• Hearthetriedandtestedstrategiesandtechnologiesusedtomitigateandprotectagainstweaknesses
• Discovertheexistingandinnovativecommunicationsolutionsyoucanutilizetosecureyoupowersystem
• Learnhowemployingsimulations,modelingandtestingtoensurethesolutionsyouimplementonyourlegacysystemdrivereliabilityandsecurity
GunnarBjoerkman, Project Co-ordinator, Viking
November 8th - 9th, Movenpick, Amsterdam, Netherlands
GROUP DISCOUNTS Moreheadsarebetterthanone!Maximisethebenefitstoyourbusiness,andensurevaluablelessonsmakeitbacktotheoffice,bysendingateamtothisevent.
Qualify for a group [email protected]+44 (0) 207 375 7537Register before August 19th to save $400You can do this in 3 easy steps:Reply to this email with BOOKME in the subject line
DRAFT COPY
look at who you could be networking with in 2011TheEnterpriseCyberSecurity&InformationAssuranceSummitprovidesoutstandingnetworkingopportunitiesforanyoneinvolvedwitheGRCstrategiestosecureCriticalInfrastructure.Thisisthepremiercybersecuritymeeting–attracting150+security&industrystakeholders.Ifsecurityorcompliancearepartofyoujobrole–yousimplycan’taffordtomissout!
We will be providing: `Dedicated networking time across the conference
` Fully interactive panel sessions for you to identify yourself to the entire delegate audience as a topic expert
`Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients
Youcouldhavemorefacetofaceconversationsatthisconferencethaninayear.Leadingindustryenduserswillbeattendingthisconferencetomeetsolutionprovidersofferingnewtechnologiesandstrategiestoreducethecostandtimeofensuringsecurityandcompliance.Signuptodayandfillyourorderbook!
ManagingDirectorsPresidentsChiefExecutivesChiefSecurityOfficer(CSO)ChiefInformationSecurityOfficer(CISO)ChiefInformationOfficer(CIO)ChiefTechnologyofficer(CTO)Seniorsecurityleads/EngineersCyberSecurityManagersReliabilityManagersDirectorofComplianceTechnicalDirectorsOperationalSecurityITSecurityStandardsManagersSeniorInformationProtectionAnalystEnterpriseinformationSecurityPrinciple
Senior/ChiefSecurityOfficersComplianceSpecialistCyberSecurityArchitectSecurityLead.SeniorSecurityConsultantDirector,NetworkSecurityPracticeSecurityLead/Co-ordinatorDirectorofCommunicationsandInformationSystemSecurityChiefTechnologistSeniorSecurityAnalystDirector/VP/ManagerofRiskDirector/VP/ManagerAuditDirector/VP/ManagerComplianceDirector/VP/ManagerInformationSecurityRisk&compliancemanagerCorporateinformation
Take a look at the job titles this conference will attract:
INDUSTRY END USERS
ATTVerizonTSystemsBTGlobalVISAEbayJPMorganChase
PaypalBankofAmericaWellFargoPGESCESempraRaytheon
NorthropGrummanBoeingLockheedMartinSAIC
Specialist Solution Providers
RSASymantecHP
SAPMicrosoftCISCO
McAfeeTyco
Key Sponsorship and Exhibition Benefits
• ThisistheonlyEnterpriseCyberSecurity&InformationAssuranceSummitwithindustrysupportcoveringthewholeofNorthAmerica–meetovera150keyindustrycolleaguesin2daysofintensebusinessdevelopment.
• Thisistheexhibitionthatprojectmanagersandkeydecisionmakerswillattendtosourcethelatestservicesandtechnologies.Don’tgetleftbehindbyyourcompetitors!
• Buildyourowncybersecuritybrandthroughhighlevelexposureonallourconferencemarketing,onsiteandinpersontofillyoursalesbookfor2012andbeyond
• Unlikemanyotherindustrytradeshows,exhibitionsandconferencesourpackagesarenot“onesizefitsall”.Telluswhatyouwanttogetoutoftheevent,whatyourbudgetisandwewillbuilditforyou…simple!
Conference Room
Coffee
REGISTRATION
Conference Room
Coffee
Coffee
1 2 10 9 8
1
2
3
4
5
6
7
8
3 4 5 67
Make a list of your most important aims
•Exhibitionbooth
•Brandvisibility
•Privatemeetings
•Breakfastbriefings
•Speakingslots
•Conferencematerialbranding•Sponsorasession
register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Call me at EyeforEnergy to discuss your package now!Exhibitionspaceregularlysellsoutweeksinadvance.Don’tmissout–secureyourplacetoday!
CAll NOWIeuan [email protected]
+44 207 375 4304
The types of Organization this conference is aimed at attracting:
Work out your budget
Speakwithyourmarketingteamanddecideyourannualconfer-enceinvestment–makesureyouassigntherightbudgettotherightshow.Nomatterwhatyourbudgetiswewillworkwithyoutobuildapackagethatachievesyouraimsandexceedsexpectations.
DepartmentofDefenceGICSRNICEFBI
DHSISACANSANIST
CERTISA
Government Agencies and Trade Associations
Break Down of Audience at Previous FC Cyber Summits
DRAFT COPY
register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Date & VenueNovember 17th - 18th, 2012Hyatt Place, San Jose, CA, USA
Hotel DiscountFC Business Intelligence has negotiated a discounted rate for all conference attendees. SImily quote the name of the conference when booking your accommodation
4 Reasons why your company needs you here...
1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they are putting in place and what solutions are leading the way in cyber security
2. Gain invaluable knowledge and insight into cost and time effective compliance, security and strategies to ensure the successful integration of new technology
3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to cyber security and smart grid deployment
4. Save your department time and money by attending this one stop shop for all things regarding cyber security; give your company the chance to make 2012 the most profitable year ever!
Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb 17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. Design by www.thecreativetree.co.uk
REGISTER NOW IN 3 EASY STEPS
I enclose a check/draft for:
(Payable to First Conferences Ltd)
Please invoice my company:
Purchase Order Number: Please
charge my credit card: Amex Visa Mastercard
Credit card number:
Expiry date: Security number:
Name on card:
Signature:
Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS
` Full access to conference, workshops and exhibition ` Full access to all lunches, breaks ` Full access to all networking events ` Full Post Conference Materials including audio recordings,
PDF presentation files and digital attendee list Super Early Bird Price - Before 17th Februrary $1795 $1595
$495 Early Bird Price - Before 16th March $1995 $1795
Full price $2195 $1995
1. Select Your Registration Package
3. Payment Options
MORE WAYS TO REGISTER
CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise
Mr/Mrs/Ms/Dr: First name: Last name:
Company: Position/Title:
Telephone: Fax: Email:
Address: Zipcode: Country:
2. Enter Attendee details DIScOunT cODE:
Enter the discount code when you register to save $100
ONLINE100
ENTERPRISE CYBER SECURITY & INFORMATION
ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA
Researched & Organized by:
“ Ihavebeenimpressedwiththelevelofunderstandingandresearchundertakenbytheorganisers,thequalityofspeakerswill
surelymakethisaneventnoonewillwanttomiss
” David Spinks, CSIRS
save $400
register before 17th February
DRAFT COPY
And many more…
Host Organization:
Government & Trade:
Industry Insight From:
Expert Speakers End User Perspective
4 EASY WAYS TO REGISTER
CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise
• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardandgivingyouthecompetitiveedge
• establishacleargovernancepolicytoenhanceawarenessthrougheducationgeneratingconfidenceinthesecurityofyoursystem
• learntomitigatetheriskthroughcertification&prioritizationtobuildresilience,improveresponsetimesandenhancesystemrobustness
• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance
• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets
• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI
ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT17-18 April, 2012, San Jose, California, USA
“ Aswenavigatenewanduncertainchallengesinthedigital
age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.
”
President Obama, 2011
Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn
save $400
register before 17th February
DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business
Development at the Premier Industry Gathering: www.cybersummits.com/enterprise
ExClUSIvE Case Studies from:
` SEMPRA
` ENBRIDGE
` Raytheon
` BT Global
` Wells Fargo
` Verizon
` JP Morgan Chase
` UTC
` FBI